{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:09Z","timestamp":1750221249771,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230855","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Converting Unstructured System Logs into Structured Event List for Anomaly Detection"],"prefix":"10.1145","author":[{"given":"Zongze","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas"}]},{"given":"Matthew","family":"Davidson","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas"}]},{"given":"Song","family":"Fu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of North Texas"}]},{"given":"Sean","family":"Blanchard","sequence":"additional","affiliation":[{"name":"HPC-DES Group, and Computer, Computational, and Statistical Sciences Division, Los Alamos National Laboratory"}]},{"given":"Michael","family":"Lang","sequence":"additional","affiliation":[{"name":"HPC-DES Group, and Computer, Computational, and Statistical Sciences Division, Los Alamos National Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of EuroMPI","author":"Pedretti K","year":"2015","unstructured":"K Pedretti , S, Olivier, G Shipman , W Shu , K Ferreira .\" Exploring MPI Application Performance Under Power Capping on the Cray XC40 Platform , Proc. of EuroMPI , 2015 . K Pedretti, S, Olivier, G Shipman, W Shu, K Ferreira.\" Exploring MPI Application Performance Under Power Capping on the Cray XC40 Platform, Proc. of EuroMPI, 2015."},{"unstructured":"https:\/\/www.olcf.ornl.gov\/computing-resources\/titan-cray-xk7\/  https:\/\/www.olcf.ornl.gov\/computing-resources\/titan-cray-xk7\/","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of IEEE\/IFIP DSN","author":"Yu Li","year":"2012","unstructured":"Li Yu , Ziming Zheng , Zhiling Lan . \" Filtering Log Data : Finding the needles in the Haystack \", Proc. of IEEE\/IFIP DSN , 2012 . Li Yu, Ziming Zheng, Zhiling Lan. \"Filtering Log Data: Finding the needles in the Haystack\", Proc. of IEEE\/IFIP DSN, 2012."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of USENIX LISA","author":"Alspaugh S.","year":"2014","unstructured":"S. Alspaugh , Archana Ganapathi , Marti A. Hearst , Randy Katz . \" Analyzing Log Analysis : An Empirical Study of User Log Mining \", Proc. of USENIX LISA , 2014 . S. Alspaugh, Archana Ganapathi, Marti A. Hearst, Randy Katz. \"Analyzing Log Analysis: An Empirical Study of User Log Mining\", Proc. of USENIX LISA, 2014."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of CUG","author":"Gunasekaran Raghul","year":"2011","unstructured":"Raghul Gunasekaran , Sarp Oral , David Dillow , Byung Park , Galen Shipman , Al Geist . \" Real-Time System Log Monitoring\/ Analytics Framework\" , Proc. of CUG , 2011 . Raghul Gunasekaran, Sarp Oral, David Dillow, Byung Park, Galen Shipman, Al Geist. \"Real-Time System Log Monitoring\/Analytics Framework\", Proc. of CUG, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/IPDPS.2011.83"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/DSN.2007.103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.5555\/2354410.2355175"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/SRDS.2012.40"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/s00450-011-0155-3"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of IEEE Workshop on IP Operations and Management","author":"Vaarandi R","year":"2003","unstructured":"R Vaarandi . \" A Data Clustering Algorithm for Mining Patterns From Event Logs\" , Proc. of IEEE Workshop on IP Operations and Management , 2003 . R Vaarandi. \"A Data Clustering Algorithm for Mining Patterns From Event Logs\", Proc. of IEEE Workshop on IP Operations and Management, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of Euro-Par","author":"Gainaru Ana","year":"2011","unstructured":"Ana Gainaru , Franck Cappello , Stefan Trausan-Matu , Bill Kramer . \" Event Log Mining Tool for Large Scale HPC Systems\" , Proc. of Euro-Par , 2011 . Ana Gainaru, Franck Cappello, Stefan Trausan-Matu, Bill Kramer. \"Event Log Mining Tool for Large Scale HPC Systems\", Proc. of Euro-Par, 2011."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of IEEE\/IFIP DSN","author":"Zheng Ziming","year":"2009","unstructured":"Ziming Zheng , Zhiling Lan , Byung H. Park , Al Geist . \" System Log Preprocessing to Improve Failure Prediction\" , Proc. of IEEE\/IFIP DSN , 2009 . Ziming Zheng, Zhiling Lan, Byung H. Park, Al Geist. \"System Log Preprocessing to Improve Failure Prediction\", Proc. of IEEE\/IFIP DSN, 2009."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/1740390.1740411"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of ACM SOSP","author":"Xu Wei","year":"2009","unstructured":"Wei Xu , Ling Huang , Armando Fox , David Patterson , Michael Jordan . \" Mining Console Logs for Large-Scale System Problem Detection\" Proc. of ACM SOSP , 2009 . Wei Xu, Ling Huang, Armando Fox, David Patterson, Michael Jordan. \"Mining Console Logs for Large-Scale System Problem Detection\" Proc. of ACM SOSP, 2009."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of IEEE ICMLA","author":"Baseman Elisabeth","year":"2016","unstructured":"Elisabeth Baseman , Sean Blanchard , Zongze Li , Song Fu. \" Relational Synthesis of Text and Numeric Data for Anomaly Detection on Computing System Logs\" , Proc. of IEEE ICMLA , 2016 . Elisabeth Baseman, Sean Blanchard, Zongze Li, Song Fu. \"Relational Synthesis of Text and Numeric Data for Anomaly Detection on Computing System Logs\", Proc. of IEEE ICMLA, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1073\/pnas.0706851105"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/347090.347167"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.5555\/599609.599626"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/ICIII.2013.6703108"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/2354410.2355175"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1016\/S0377-2217(01)00029-7"},{"doi-asserted-by":"crossref","unstructured":"David Niju. \"Law of Total Probability\" 2008.  David Niju. \"Law of Total Probability\" 2008.","key":"e_1_3_2_1_24_1","DOI":"10.2139\/ssrn.1310502"},{"unstructured":"Mutrino Sandia National Labs http:\/\/hpc.sandia.gov\/aces\/  Mutrino Sandia National Labs http:\/\/hpc.sandia.gov\/aces\/","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/ICASSP.2011.5947611"},{"key":"e_1_3_2_1_27_1","volume-title":"Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm. Neural Information Processing, Models and Applications","author":"Jeatrakul","year":"2010","unstructured":"Jeatrakul P., Wong K.W. , Fung C.C. ( 2010 ) Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm. Neural Information Processing, Models and Applications . Springer , 2010. Jeatrakul P., Wong K.W., Fung C.C. (2010) Classification of Imbalanced Data by Combining the Complementary Neural Network and SMOTE Algorithm. Neural Information Processing, Models and Applications. Springer, 2010."},{"unstructured":"https:\/\/keras.io\/.  https:\/\/keras.io\/.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1162\/neco.1997.9.8.1735"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.5555\/944919.944937"}],"event":{"sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"acronym":"ARES 2018","name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230855","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230855","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230855"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":30,"alternative-id":["10.1145\/3230833.3230855","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230855","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}